Test Bank—Chapter Four (Networks and the Internet) Multiple Choice Questions 1. Which of the following is not a way of classifying networks? A. WAN versus LAN C. Router versus bridge B. Closed versus open D. Star versus bus ANSWER: C 2. Ethernet is a means of implementing which of the following network topologies? A. Star B. WiFi C. Bus ANSWER: C 3. Which of the following connects existing networks to form an internet? A. Bridge B. Router C. Switch D. Repeater ANSWER: B 4. Which of the following is a protocol for controlling the right to transmit a message in a network? A. UDP B. CSMA/CD C. TCP D. FTP ANSWER: B 5. Which of the following is not a means of performing interprocess communication over a network? A. Client/server B. ICANN C. Peer-to-peer ANSWER: B 6. Which of the following is assigned the task of providing individual users access to the Internet? A. Tier-1 ISPs B. Tier-2 ISPs C. Access ISPs D. ICANN ANSWER: C 7. Which of the following is not an application of the Internet? A. FTP B. Email C. Telnet D. CERT ANSWER: D 8. The primary purpose of which of the following is not the enhancement of security? A. ICANN B. Firewall C. Encryption D. CERT ANSWER: A 9. Which of the following is used to translate between IP addresses and mnemonic addresses? A. File server B. Mail server C. Name server D. FTP server ANSWER: C 10. Which of the following is not a means of connecting networks? A. Switch B. Server C. Router D. Bridge ANSWER: B 11. Which layer of the TCP/IP hierarchy actually transmits a message? A. Application B. Transport C. Network D. Link ANSWER: D 12. Which layer of the TCP/IP hierarchy chops messages into units whose size is compatible with the Internet? A. Application B. Transport C. Network D. Link ANSWER: B 13. Which layer of the TCP/IP hierarchy decides the direction in which message segments are transferred across the Internet? A. Application B. Transport C. Network D. Link ANSWER: C 14. Which layer of the TCP/IP hierarchy decides which application should receive an incoming message? A. Application B. Transport C. Network D. Link ANSWER: A 15. Which layer of the TCP/IP hierarchy presents incoming messages to the computer user? A. Application B. Transport C. Network D. Link ANSWER: A 16. Which layer of the TCP/IP hierarchy reassembles messages as their pieces arrive at the destination? A. Application B. Transport C. Network D. Link ANSWER: B 17. Which layer of the TCP/IP hierarchy is responsible for obtaining the correct address for a message’s destination? A. Application ANSWER: A B. Transport C. Network D. Link 18. Which of the following identifies the application to which a message arriving from the Internet should be given? A. Protocol B. Port number C. Domain D. Hop count ANSWER: B 19. Which standards organization produced the OSI reference model for internet communication? A. ANSI B. IEEE C. ISO ANSWER: C 20. Which of the following is an Internet application that is named after its underlying protocol? A. EmailB. World Wide Web C. FTP D. UDP ANSWER: C 21. Which of the following is not a means of implementing server-side activities? A. CGI B. JSP C. ASP D. Applets ANSWER: D 22. Which of the following is not a protocol used in the basic TCP/IP software hierarchy? A. POP3 B. UDP C. TCP D. IP ANSWER: A Fill-in-the-blank/Short-answer Questions 1. List two network topologies. A. _____________ B. _____________ ANSWER: star and bus 2. What are two protocols for implementing the transport level in the “TCP/IP hierarchy”? A. _____________ B. ______________ ANSWER: TCP and UDP 3. Draw a circle the portion of the URL below that identifies the directory containing the file being addressed. Underline the portion that identifies the protocol that should be used when accessing the file. Draw a rectangle around the portion that identifies the file name itself. http://batcave.metropolis.com/heroes/superheroes/batpage.html ANSWER: Circle: superheroes, underline: http, rectangle: batpage.html (or just batpage) 4. Underline the portion of the URL below that identifies the classification (top-level domain) of the registered domain in which the pertinent Web server resides. Draw a rectangle around the portion that indicates the directory path the server should follow to find the designated document. http://batcave.metropolis.com/heroes/superheroes/batpage.html ANSWER: Underline: com, rectangle: heroes/superheroes 5. Draw a rectangle around the portion of the email address below that identifies the “person” who should receive the message. Underline the portion that identifies the location of the mail server that handles the mail for that person. Fido@dogmail.zoo.org ANSWER: Rectangle: Fido, underline: dogmail.zoo.org 6. What bit pattern is represented by 33.42.18 in dotted decimal notation? __________________________________________________ ANSWER: 00100001 00101010 00010010 (212A12 in hexadecimal) 7. Express the bit pattern 0001001000001100 in dotted decimal notation. ________________ ANSWER: 18.12 8. The main purpose of _______ and ________ ISPs is to provide a system of high-speed routers that serve as the Internet’s communication backbone, whereas _________ ISPs concentrate on providing Internet access to the Internet’s users. ANSWER: Tier-1, tier-2, access 9. Name three kinds of servers. A. ___________________________ B. ___________________________ C. ___________________________ ANSWER: Possible answers include: name server, file server, mail server, Web server, etc. 10. List four top-level domains. A. _____________ B. _______________ C. _____________ D. _______________ ANSWER: Possible answers include com, org, edu, gov, net, uk, ca, etc. 11. What terms in the following HTML document are linked to other documents? <html> <head> <title>This is the title</title> </head> <body> <h1>Favorite Animals</h1> <p>Of all the animals in the world, the <a href=”http://pigs.org/pigs.html”>pig</a> is perhaps the most charming.</p><p>However, the <a href=”http://hippopotamuscity.org/hippo.html”> hippopotamus</a> is also cute.</p> </body> </html> ANSWER: pig, hippopotamus 12. Fill in the blanks in the HTML document below so that the term “Earth” will be linked to the HTML document “earthinfo.html” in the directory “earthdir” at “earthnews.com.” <html> <head> <title>Earth page</title> </head> <body> <p>The planet we live on is called _________________________________________ Earth ____________ </p> </body> </html> ANSWER: <a href=”http://earthnews.com/earthdir/earthinfo.html”>, </a> 13. Fill in the blanks with the missing tags to the following HTML document. <html> <head> ______ Title </title> </head> _______ <p>Click on <a href=”http://this..org”> this. _______ ______ </body> </html> ANSWER: The following tags are missing: <title>, >, <body>, </a>, and </p>. 14. Fill in the blank in the following HTML document so that the image called dog.jpg will be displayed at the top of the page. <body> ______________________ <p>Above is a picture of Fido.</p> </body> ANSWER: <img src = “dog.jpg”> 15. List two features of HTML that conform to the XML style. A. _____________________________ B. _____________________________ ANSWER: Possible answer include: Tags are surrounded by < and >, tags that close an item are the same as the opening tag except that / is added, tag name are in lower case, and others. 16. Identify two protocols used in networks to determine the right to transmit an original message. A. _________________ B. _________________ ANSWER: CSMA/CD and CSMA/CA 17. Identify a protocol used in the implementation of the network layer in the TCP/IP hierarchy. ______________ ANSWER: IP 18. In each blank below write the HTML tag that performs the indication function. A. __________ Begins the part that describes what will appear on the computer screen B. __________ Marks the end of the HTML document C. __________ Marks the beginning of a paragraph D. __________ Marks the end of a term that is linked to another document ANSWER: A. <body> B. </html> C. <p> D. </a> 19. The client/server model refers to a form of interprocess communication in which one process, known as the ________________ , runs continuously so that it can be contacted by other processes, known as ________________ , as needed. In contrast is the ____________________ model of interprocess communication in which two processes communicate as equals. ANSWER: server, clients, peer-to-peer 20. Where would be the most likely place to put a firewall to provide each of the following services? A. ___________________ Protect an entire domain from attacks from the cloud B. ___________________ Protect an entire domain from spam C. ___________________ Protect an individual machine from worms and viruses ANSWER: A. At the gateway B. At the domain’s mail server C. At the individual machine 21. Write the entire URL required to retrieve the Web document named bulldogs.html from the Web server at animals.org assuming that the document is stored in the directory named dogs. ANSWER: http://animals.org/dogs/bulldogs.html Vocabulary (Matching) Questions The following is a list of terms from the chapter along with descriptive phrases that can be used to produce questions (depending on the topics covered in your course) in which the students are ask to match phrases and terms. An example would be a question of the form, “In the blank next to each phrase, write the term from the following list that is best described by the phrase.” Term Descriptive Phrase internet tier-1 ISP access ISP domain protocol cloud IP address HTML A network of networks An organization that provides the Internet’s communication backbone An organization that provides access to the Internet A name registered with ICANN for identification purposes A governing set of rules The portion of the Internet lying outside one’s domain Identifies a machine on the Internet A notational system for indicating how a Web document is to be displayed by a browser A means of blocking undesired messages A message segment that is transmitted over the Internet independently A “format” for markup languages A protocol for transferring files A means of connecting networks to form an internet A notational system for representing bit patterns A means of identifying a document on the Web A means of finding relevant information on the Web A means of implementing a network with the bus topology A protocol for the transport layer A protocol for the network layer firewall packet XML FTP router dotted decimal URL search engine Ethernet UDP IP General Format Questions 1. What is the difference between a repeater and a bridge? ANSWER: Both repeaters and bridges are used to connect two buses, but a repeater transfers all messages whereas a bridge transfers only those messages destined for the other side. 2. What is the difference between hubs, switches, and routers? ANSWER: A hub is merely a central (short) bus to which computers are connected to form a bus network. A switch connects several bus networks to form a larger network. A router connects two networks to form an internet in which the original two networks continue to function as independent networks. 3. Many people use the terms Internet and world-wide web interchangeably. What is the difference between the Internet and the world-wide web? ANSWER: The Internet is the infrastructure used by the world-wide web. That is, the world-wide web is only one application of the Internet. Other applications include email, ftp, and telnet. 4. What are HTML and XML? ANSWER: HTML is an actual markup language. XML is not a markup language itself. Instead it is a markup language “style.” 5. What are some distinctions between UDP and TCP? ANSWER: UDP is a connectionless protocol whereas TCP establishes a two way communication between the origin and destination of a message. TCP is a reliable protocol in that the origin and destination work together to confirm that the entire message was successfully transferred. In contrast, UDP merely transmits the message without confirming it reception. 6. As an encryption system, what is unique about public-key encryption (that is, why is public-key encryption so named)? ANSWER: In a public-key encryption system, knowing the encryption key does not allow one to decipher a message. Thus, the encryption key can be public knowledge without violating security. 7. Draw a sketch showing how the following HTML document would appear on the computer screen when displayed by a browser. <html> <head> <title>This is the title</title> </head> <body> <h1>Mud Art</h1> </body> </html> ANSWER: The displayed page contains only the words “Mud Art” displayed as a major heading. The words “This is the title” are NOT part of the displayed page. 8. Draw a sketch showing how the following HTML document would appear on the computer screen when displayed by a browser. <html> <head> <title>This is the title</title> </head> <body> <h1>Favorite Animals</h1> <p>Of all the animals in the world, the <a href=”http://pigs.org/pigs.html”>pig</a> is perhaps the most charming.</p><p>However, the <a href=”http://hippopotamuscity.org/hippo.html”> hippopotamus</a> is also cute.</p> </body> </html> ANSWER: Something like this: Favorite Animals Of all the animals in the world, the pig is perhaps the most charming. However, the hippopotamus is also cute. 9. What would happen if a user clicked the mouse on the term “pig” while viewing the HTML document shown below? <html> <head> <title>This is the title</title> </head> <body> <h1>Favorite Animals</h1> <p>Of all the animals in the world, the <a href=”http://pigs.org/pigs.html”>pig</a> is perhaps the most charming.</p><p>However, the <a href=”http://hippopotamuscity.org/hippo.html”> hippopotamus</a> is also cute.</p> </body> </html> ANSWER: The browser would retrieve and display the document pigs.html. 10. To what do the terms “server side” and “client side” refer? ANSWER: They indicate whether the identified activity is performed by the client or the server when using the client/server model for interprocess communication. 11. What assumptions are made when a URL is denoted by merely zoo.org? ANSWER: It is assumed that the protocol is http and that the document desired is the default document in the default directory. 12. Briefly summarize the steps performed by each of the four layers in the TCP/IP hierarchy at the computer at which a message originates. ANSWER: Application layer: originates the message and obtains destination’s IP address. Transport layer: chops message into segments and assigns sequence numbers. Network layer: determines intermediate address. Link layer: transmits message segments.